mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-27 04:37:57 +00:00
7a619ea222
* Initial rename of consensus -> validation * Rename crate imports * network: rename consensus to validation * network: rename consensus in comments and logs * Grumbles * Rename tests consensus -> validation
327 lines
9.7 KiB
Rust
327 lines
9.7 KiB
Rust
// Copyright 2018 Parity Technologies (UK) Ltd.
|
|
// This file is part of Polkadot.
|
|
|
|
// Polkadot is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Polkadot is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Polkadot. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//! Tests for polkadot and validation network.
|
|
|
|
use super::{PolkadotProtocol, Status, Message, FullStatus};
|
|
use validation::{ValidationSession, Knowledge};
|
|
|
|
use parking_lot::Mutex;
|
|
use polkadot_validation::GenericStatement;
|
|
use polkadot_primitives::{Block, SessionKey};
|
|
use polkadot_primitives::parachain::{CandidateReceipt, HeadData, BlockData};
|
|
use substrate_primitives::H512;
|
|
use codec::Encode;
|
|
use substrate_network::{
|
|
Severity, NodeIndex, PeerInfo, ClientHandle, Context, config::Roles,
|
|
message::Message as SubstrateMessage, specialization::NetworkSpecialization,
|
|
generic_message::Message as GenericMessage
|
|
};
|
|
|
|
use std::sync::Arc;
|
|
use futures::Future;
|
|
|
|
mod validation;
|
|
|
|
#[derive(Default)]
|
|
struct TestContext {
|
|
disabled: Vec<NodeIndex>,
|
|
disconnected: Vec<NodeIndex>,
|
|
messages: Vec<(NodeIndex, SubstrateMessage<Block>)>,
|
|
}
|
|
|
|
impl Context<Block> for TestContext {
|
|
fn client(&self) -> &ClientHandle<Block> {
|
|
unimplemented!()
|
|
}
|
|
|
|
fn report_peer(&mut self, peer: NodeIndex, reason: Severity) {
|
|
match reason {
|
|
Severity::Bad(_) => self.disabled.push(peer),
|
|
_ => self.disconnected.push(peer),
|
|
}
|
|
}
|
|
|
|
fn peer_info(&self, _peer: NodeIndex) -> Option<PeerInfo<Block>> {
|
|
unimplemented!()
|
|
}
|
|
|
|
fn send_message(&mut self, who: NodeIndex, data: SubstrateMessage<Block>) {
|
|
self.messages.push((who, data))
|
|
}
|
|
}
|
|
|
|
impl TestContext {
|
|
fn has_message(&self, to: NodeIndex, message: Message) -> bool {
|
|
use substrate_network::generic_message::Message as GenericMessage;
|
|
|
|
let encoded = message.encode();
|
|
self.messages.iter().any(|&(ref peer, ref msg)| match msg {
|
|
GenericMessage::ChainSpecific(ref data) => peer == &to && data == &encoded,
|
|
_ => false,
|
|
})
|
|
}
|
|
}
|
|
|
|
fn make_status(status: &Status, roles: Roles) -> FullStatus {
|
|
FullStatus {
|
|
version: 1,
|
|
roles,
|
|
best_number: 0,
|
|
best_hash: Default::default(),
|
|
genesis_hash: Default::default(),
|
|
chain_status: status.encode(),
|
|
}
|
|
}
|
|
|
|
fn make_validation_session(local_key: SessionKey) -> (ValidationSession, Arc<Mutex<Knowledge>>) {
|
|
let knowledge = Arc::new(Mutex::new(Knowledge::new()));
|
|
let c = ValidationSession::new(knowledge.clone(), local_key);
|
|
|
|
(c, knowledge)
|
|
}
|
|
|
|
fn on_message(protocol: &mut PolkadotProtocol, ctx: &mut TestContext, from: NodeIndex, message: Message) {
|
|
let encoded = message.encode();
|
|
protocol.on_message(ctx, from, &mut Some(GenericMessage::ChainSpecific(encoded)));
|
|
}
|
|
|
|
#[test]
|
|
fn sends_session_key() {
|
|
let mut protocol = PolkadotProtocol::new(None);
|
|
|
|
let peer_a = 1;
|
|
let peer_b = 2;
|
|
let parent_hash = [0; 32].into();
|
|
let local_key = [1; 32].into();
|
|
|
|
let validator_status = Status { collating_for: None };
|
|
let collator_status = Status { collating_for: Some(([2; 32].into(), 5.into())) };
|
|
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
protocol.on_connect(&mut ctx, peer_a, make_status(&validator_status, Roles::AUTHORITY));
|
|
assert!(ctx.messages.is_empty());
|
|
}
|
|
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
let (session, _knowledge) = make_validation_session(local_key);
|
|
protocol.new_validation_session(&mut ctx, parent_hash, session);
|
|
assert!(ctx.has_message(peer_a, Message::SessionKey(local_key)));
|
|
}
|
|
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
protocol.on_connect(&mut ctx, peer_b, make_status(&collator_status, Roles::NONE));
|
|
assert!(ctx.has_message(peer_b, Message::SessionKey(local_key)));
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn fetches_from_those_with_knowledge() {
|
|
let mut protocol = PolkadotProtocol::new(None);
|
|
|
|
let peer_a = 1;
|
|
let peer_b = 2;
|
|
let parent_hash = [0; 32].into();
|
|
let local_key = [1; 32].into();
|
|
|
|
let block_data = BlockData(vec![1, 2, 3, 4]);
|
|
let block_data_hash = block_data.hash();
|
|
let candidate_receipt = CandidateReceipt {
|
|
parachain_index: 5.into(),
|
|
collator: [255; 32].into(),
|
|
head_data: HeadData(vec![9, 9, 9]),
|
|
signature: H512::from([1; 64]).into(),
|
|
balance_uploads: Vec::new(),
|
|
egress_queue_roots: Vec::new(),
|
|
fees: 1_000_000,
|
|
block_data_hash,
|
|
};
|
|
|
|
let candidate_hash = candidate_receipt.hash();
|
|
let a_key = [3; 32].into();
|
|
let b_key = [4; 32].into();
|
|
|
|
let status = Status { collating_for: None };
|
|
|
|
let (session, knowledge) = make_validation_session(local_key);
|
|
protocol.new_validation_session(&mut TestContext::default(), parent_hash, session);
|
|
|
|
knowledge.lock().note_statement(a_key, &GenericStatement::Valid(candidate_hash));
|
|
let recv = protocol.fetch_block_data(&mut TestContext::default(), &candidate_receipt, parent_hash);
|
|
|
|
// connect peer A
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
protocol.on_connect(&mut ctx, peer_a, make_status(&status, Roles::AUTHORITY));
|
|
assert!(ctx.has_message(peer_a, Message::SessionKey(local_key)));
|
|
}
|
|
|
|
// peer A gives session key and gets asked for data.
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
on_message(&mut protocol, &mut ctx, peer_a, Message::SessionKey(a_key));
|
|
assert!(protocol.validators.contains_key(&a_key));
|
|
assert!(ctx.has_message(peer_a, Message::RequestBlockData(1, parent_hash, candidate_hash)));
|
|
}
|
|
|
|
knowledge.lock().note_statement(b_key, &GenericStatement::Valid(candidate_hash));
|
|
|
|
// peer B connects and sends session key. request already assigned to A
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
protocol.on_connect(&mut ctx, peer_b, make_status(&status, Roles::AUTHORITY));
|
|
on_message(&mut protocol, &mut ctx, peer_b, Message::SessionKey(b_key));
|
|
assert!(!ctx.has_message(peer_b, Message::RequestBlockData(2, parent_hash, candidate_hash)));
|
|
|
|
}
|
|
|
|
// peer A disconnects, triggering reassignment
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
protocol.on_disconnect(&mut ctx, peer_a);
|
|
assert!(!protocol.validators.contains_key(&a_key));
|
|
assert!(ctx.has_message(peer_b, Message::RequestBlockData(2, parent_hash, candidate_hash)));
|
|
}
|
|
|
|
// peer B comes back with block data.
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
on_message(&mut protocol, &mut ctx, peer_b, Message::BlockData(2, Some(block_data.clone())));
|
|
drop(protocol);
|
|
assert_eq!(recv.wait().unwrap(), block_data);
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn fetches_available_block_data() {
|
|
let mut protocol = PolkadotProtocol::new(None);
|
|
|
|
let peer_a = 1;
|
|
let parent_hash = [0; 32].into();
|
|
|
|
let block_data = BlockData(vec![1, 2, 3, 4]);
|
|
let block_data_hash = block_data.hash();
|
|
let para_id = 5.into();
|
|
let candidate_receipt = CandidateReceipt {
|
|
parachain_index: para_id,
|
|
collator: [255; 32].into(),
|
|
head_data: HeadData(vec![9, 9, 9]),
|
|
signature: H512::from([1; 64]).into(),
|
|
balance_uploads: Vec::new(),
|
|
egress_queue_roots: Vec::new(),
|
|
fees: 1_000_000,
|
|
block_data_hash,
|
|
};
|
|
|
|
let candidate_hash = candidate_receipt.hash();
|
|
let av_store = ::av_store::Store::new_in_memory();
|
|
|
|
let status = Status { collating_for: None };
|
|
|
|
protocol.register_availability_store(av_store.clone());
|
|
|
|
av_store.make_available(::av_store::Data {
|
|
relay_parent: parent_hash,
|
|
parachain_id: para_id,
|
|
candidate_hash,
|
|
block_data: block_data.clone(),
|
|
extrinsic: None,
|
|
}).unwrap();
|
|
|
|
// connect peer A
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
protocol.on_connect(&mut ctx, peer_a, make_status(&status, Roles::FULL));
|
|
}
|
|
|
|
// peer A asks for historic block data and gets response
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
on_message(&mut protocol, &mut ctx, peer_a, Message::RequestBlockData(1, parent_hash, candidate_hash));
|
|
assert!(ctx.has_message(peer_a, Message::BlockData(1, Some(block_data))));
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn remove_bad_collator() {
|
|
let mut protocol = PolkadotProtocol::new(None);
|
|
|
|
let who = 1;
|
|
let account_id = [2; 32].into();
|
|
|
|
let status = Status { collating_for: Some((account_id, 5.into())) };
|
|
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
protocol.on_connect(&mut ctx, who, make_status(&status, Roles::NONE));
|
|
}
|
|
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
protocol.disconnect_bad_collator(&mut ctx, account_id);
|
|
assert!(ctx.disabled.contains(&who));
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn many_session_keys() {
|
|
let mut protocol = PolkadotProtocol::new(None);
|
|
|
|
let parent_a = [1; 32].into();
|
|
let parent_b = [2; 32].into();
|
|
|
|
let local_key_a = [3; 32].into();
|
|
let local_key_b = [4; 32].into();
|
|
|
|
let (session_a, _knowledge_a) = make_validation_session(local_key_a);
|
|
let (session_b, _knowledge_b) = make_validation_session(local_key_b);
|
|
|
|
protocol.new_validation_session(&mut TestContext::default(), parent_a, session_a);
|
|
protocol.new_validation_session(&mut TestContext::default(), parent_b, session_b);
|
|
|
|
assert_eq!(protocol.live_validation_sessions.recent_keys(), &[local_key_a, local_key_b]);
|
|
|
|
let peer_a = 1;
|
|
|
|
// when connecting a peer, we should get both those keys.
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
|
|
let status = Status { collating_for: None };
|
|
protocol.on_connect(&mut ctx, peer_a, make_status(&status, Roles::AUTHORITY));
|
|
|
|
assert!(ctx.has_message(peer_a, Message::SessionKey(local_key_a)));
|
|
assert!(ctx.has_message(peer_a, Message::SessionKey(local_key_b)));
|
|
}
|
|
|
|
let peer_b = 2;
|
|
|
|
protocol.remove_validation_session(&parent_a);
|
|
|
|
{
|
|
let mut ctx = TestContext::default();
|
|
|
|
let status = Status { collating_for: None };
|
|
protocol.on_connect(&mut ctx, peer_b, make_status(&status, Roles::AUTHORITY));
|
|
|
|
assert!(!ctx.has_message(peer_b, Message::SessionKey(local_key_a)));
|
|
assert!(ctx.has_message(peer_b, Message::SessionKey(local_key_b)));
|
|
}
|
|
}
|